...
首页> 外文期刊>Information Security Technical Report >A flow-based detection method for stealthy dictionary attacks against Secure Shell
【24h】

A flow-based detection method for stealthy dictionary attacks against Secure Shell

机译:一种基于流的安全壳秘密字典攻击检测方法

获取原文
获取原文并翻译 | 示例

摘要

SANS has warned about the new variants of SSH dictionary attacks that are very stealthy in comparison with a simple attack. In this paper, we propose a new method to detect simple and stealthy attacks by combining two key innovations. First, on the basis of our assumptions, we employ two criteria: "the existence of a connection protocol" and "the inter-arriual time of an auth-packet and the next". These criteria are not available, though, owing to the confidentiality and flexibility of the SSH protocol. Second, we resolve this problem by identifying "the transition point of each sub-protocol" through flow features and machine learning algorithms. We evaluate the effectiveness through experiments on real network traffic at the edges in campus networks. The experimental results show that our method provides high accuracy with acceptable computational complexity.
机译:SANS已警告SSH字典攻击的新变种,与简单攻击相比,它们非常隐蔽。在本文中,我们提出了一种通过结合两个关键创新来检测简单和隐秘攻击的新方法。首先,根据我们的假设,我们采用两个标准:“连接协议的存在”和“ auth-packet到下一个的到达时间”。但是,由于SSH协议的机密性和灵活性,这些标准不可用。其次,我们通过流程特征和机器学习算法确定“每个子协议的过渡点”来解决此问题。我们通过对校园网络边缘的实际网络流量进行实验来评估有效性。实验结果表明,该方法具有较高的精度和可接受的计算复杂度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号